Introduction to Cybercrime:
Cybercrime:
Definition and Origins of the Word, Cybercrime and Information Security, Whoare Cybercriminals? Classifications of Cybercrimes, An Indian Perspective, Hacking and Indian Laws., Global Perspectives
Textbook:1 Chapter 1 (1.1 to 1.5, 1.7-1.9)
Cyber Offenses:
How Criminals Plan Them:
Introduction, How criminals plan the attacks, Social Engineering, Cyber Stalking, Cybercaafe & cybercrimes.
Botnets:
The fuel for cybercrime, Attack Vector.
Textbook:1 Chapter 2 (2.1 to 2.7)
Tools and Methods used in Cybercrime:
Introduction, Proxy Servers, Anonymizers, Phishing, Password Cracking, Key Loggers and Spyways, Virus and Worms, Trozen Horses and Backdoors, Steganography, DoS and DDOS Attackes, Attacks on Wireless networks.
Textbook:1 Chapter 4 (4.1 to 4.9, 4.12)
Phishing and Identity Theft:
Introduction, methods of phishing, phishing,phisingtechniques, spear phishing, types of phishing scams, phishing toolkits and spy phishing, counter measures, Identity Theft
Textbook:1 Chapter 5 (5.1. to 5.3)
Understnading Computer Forensics:
Introdcution, Historical Background of Cyberforensics, Digital Foresics Science, Need for Computer Foresics, Cyber Forensics and Digital Evidence, Digital Forensic Life cycle, Chain of Custody Concepts, network forensics.
Textbook:1 Chapter 7 (7.1. to 7.5, 7.7 to 7.9)
Course outcome (Course Skill Set)
At the end of the course the student will be able to:
CO1Explain the cybercrime terminologies
CO2Describe Cyber offenses and Botnets
CO3Illustrate Tools and Methods used on Cybercrime
CO4Explain Phishing \\ and Identity Theft
CO5Justify the need of computer forensics
Assessment Details (both CIE and SEE)
Continuous Internal Evaluation(CIE):
Two Unit Tests each of30 Marks (duration 01 hour)
Two assignments each of 20 Marks
The teacher has to plan the assignments and get them completed by the students well before the closing of the term so that marks entry in the examination portal shall be done in time. Formative (Successive) Assessments include Assignments/Quizzes/Seminars/ Course projects/Field surveys/ Case studies/ Hands-on practice (experiments)/Group Discussions/ others. . The Teachers shall choose the types of assignments depending on the requirement of the course and plan to attain the Cos and POs. (to have a less stressed CIE, the portion of the syllabus should not be common /repeated for any of the methods of the CIE. Each method of CIE should have a different syllabus portion of the course). CIE methods /test question paper is designed to attain the different levels of Bloom’s taxonomy as per the outcome defined for the course.
The sum of two tests, two assignments, will be out of 100 marks and will be scaled down to 50 marks
Semester End Examination(SEE):
Theory SEE will be conducted by University as per the scheduled timetable, with common question papers for the subject (duration 03 hours)
Suggested Learning Resources:
Books (Title of the Book/Name of the author/Name of the publisher/Edition and Year)
1.Sunit Belapure and Nina Godbole, “Cyber Security: Understanding Cyber Crimes, Computer Forensics And Legal Perspectives”, Wiley India Pvt Ltd, ISBN: 978-81-265-21791, 2011, First Edition (Reprinted 2018)